HackDig : Dig high-quality web security articles for hacker

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches.
S

In an ever-changing, dynamic threat landscape, a chief information security officer (CISO) in the health care sector must have knowledge in multiple areas and understand that data breaches have severe repercussions that affect employees, patients and the organization at large. To respond effectively to health care security risks, a CISO must possess well-rou

Every chief information security officer (CISO) faces ongoing threats to his or her company’s assets. While some threats apply to every industry, IT security specialists in the health care, financial services, and energy and utilities sectors need to pay more attention to industry-specific security risks. Although these threats are most prevalent in th

In health care, cyberthreats pose a substantial risk to patient safety, systems of care and business continuity. The security of electronic medical information has a tremendous impact on data access, which directly affects quality of care, patients’ rights to privacy and the professional standing of health care organizations.
Practitioners can only mak

The health care market is quite heterogeneous, and as a result, each organization has a unique set of cybsersecurity needs and characteristics. The industry includes hospitals of all sizes, local doctoral consortia, public health care institutions and individual physicians. Naturally, health care security risks vary depending on the size and type of organiza

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused.
Cognitive technology can help make sense of this data, better align it to business goals an

The Internet of Things: Enabling Innovation and Exploitation
Stop checking whether or not you’ve achieved your step goal. Right now.
The widespread use of bring-your-own-device (BYOD) strategies and the shift towards interoperability within the Internet of Things (IoT) — the interconnection of computing devices embedded in everyday objects such as watc

Imagine that your health care organization just went on bypass due to a cyberattack. For those unfamiliar with the term, bypass is when a health care facility is unable to provide services for one reason or another. When an emergency room parking bay area is literally full of ambulances, for example, the hospital may go on bypass to ensure that any addition

More so than in any other industry, the recent WannaCry attack caused health care organizations to rethink processes for keeping systems current and secure. Although Microsoft patched the very vulnerabilities WannaCry exploited over three months ago, many organizations are still struggling to find and patch relevant computers and systems.
The Hidden Complexi

Health care is under siege from cybersecurity threats. As noted by Healthcare IT News, another large-scale health insurance vendor recently shuttered its patient portal to deal with vulnerabilities that exposed personal data. Meanwhile, Beta News reported that 43 percent of all data breaches in the U.K. come from the health care sector.
Now, the U.S. Departm

A computer generation or two ago, IT managers fought a futile uphill battle to prevent rogue PCs from infiltrating the workplace, a battle fought largely in the name of data security. Their thinking was that if IT couldn’t manage it, they couldn’t secure it. Is history repeating itself with health care IoT devices?
Fast forward to the present h

For organizations in highly regulated sectors such as health care, compliance with regulatory standards is not just a good idea; it’s the law. Moreover, there is a broad consensus that the regulatory standards are soundly based on security principles. Complaints about excessive or misguided regulations are not often heard.
But the flip side of this r

If you’re a member of my generation living in the U.S., you may remember the Bubble Boy. His story grabbed the national consciousness and was made into a TV movie featuring John Travolta. It was a sad tale of how a boy with a severe immune deficiency was forced to live his life inside a plastic bubble to protect him from pathogens. A single breach of t

With the increased focus on the importance of cybersecurity in the health care industry, it is important to think of a more holistic approach to address the industry’s pain points when managing the massive amounts of data are generated at an incredible pace every day. This growing challenge calls for an immune system approach to security.
According to

Health care security spending is one of those riddles wrapped in a mystery inside an enigma. Assets such as electronic medical records (EMR), which are ostensibly protected by security solutions, are probably cybercriminals’ most prized purloined item. On the Dark Web, a stolen EMR laden with its immutable data can fetch as much as $350 per individual